Skip to content

xpool.eu

crypto news aggregator

Binance Cybersecurity SMS Phishing

Binance Bolsters Security Against SMS Phishing Scams

Posted on: April 14, 2025

Crypto exchange Binance has taken proactive steps to combat a rise in sophisticated phishing scams targeting users through SMS messages. The company added an anti-phishing code to its […]

Cryptocurrency Cybersecurity Malware

Crypto Wallet Malware Injects Codes, Stealing Funds from Users

Posted on: April 13, 2025

Cybersecurity researchers have uncovered a sophisticated malware campaign targeting crypto users through compromised npm packages. The attack uses legitimate-looking software to steal digital assets from unsuspecting victims. Malicious […]

AI Fraud Cryptocurrency Cybersecurity

Spanish Police Take Down $21M AI-Driven Crypto Fraud Scheme

Posted on: April 13, 2025

Spanish authorities have dismantled a sophisticated cryptocurrency scam worth $21 million, utilizing artificial intelligence (AI) to deceive victims. This operation resulted in arrests of key individuals involved in […]

Banking Cybersecurity Financial Security

JPMorgan Chase Denies $440,000 Reimbursement After Account Breach

Posted on: April 12, 2025

JPMorgan Chase has declined to reimburse a customer for $440,000 in unauthorized withdrawals following an account breach. The bank maintains compliance with their security policies as the reason […]

Cryptocurrency Cybersecurity Russia

Russian Crypto Theft Losses Reach $150 Million in 2024

Posted on: April 11, 2025

A new study by cybersecurity experts reveals that Russians have suffered significant financial losses due to crypto theft in the past year, totaling over $150 million. These losses […]

Africa Cybersecurity Threat Detection

Africa Faces 131.6 Million Web Threats: Kenya and South Africa Top the List

Posted on: April 11, 2025

As Africa’s digital landscape continues to expand, so too does its vulnerability to cybersecurity threats. New data from Kaspersky Security Network reveals a startling number of web attacks […]

Cryptocurrency Cybersecurity Trojan

New Trojan Threat Targets Crypto Users – Beware of ‘pdf-to-office’ Package

Posted on: April 10, 2025

Cybersecurity researchers warn of a sophisticated software supply chain attack targeting Web3 wallets. Attackers have created a deceptive package called ‘pdf-to-office’, falsely promising PDF file conversion capabilities. In […]

Cybersecurity Google Play Store Malware

Nigerian Users Warned About Malicious Websites Imitating Google Play Store

Posted on: April 10, 2025

The National Information Technology Development Agency (NITDA) has issued a warning to Nigerians about the ‘PlayPraetor Trojan,’ a new cybercrime attack targeting websites that mimic the Google Play […]

Cryptocurrency Cybersecurity WazirX

WazirX Secures Creditor Approval for Recovery Plan After $234M Hack

Posted on: April 10, 2025

India’s WazirX, once the country’s leading cryptocurrency exchange, has taken a significant step towards recovery after a major cyberattack. The company has secured approval from over 93% of […]

Crypto Regulations Cybersecurity Thailand

Thailand Tightens Regulation of Crypto, Aims to Curb Cybercrime

Posted on: April 10, 2025

Thailand is bolstering its regulatory efforts to combat cybercrimes and address crypto fraud. New emergency regulations, approved by the country’s Cabinet, aim to strengthen measures against illicit activities […]

Cryptocurrency Cybersecurity Malware

Kaspersky Discovers Crypto-Stealing Malware on Microsoft SourceForge

Posted on: April 9, 2025

Security firm Kaspersky has uncovered a sophisticated malware disguised as a Microsoft Office plugin lurking on the popular software repository SourceForge. This malicious program steals crypto from unsuspecting […]

Crypto Exchange Cybersecurity WazirX

WazirX Moves Forward: Over 90% of Creditors Approve Restructuring Plan After Major Hack

Posted on: April 9, 2025

India’s WazirX, once the country’s leading cryptocurrency exchange, has cleared a critical hurdle in its path to recovery. On April 7th, Zettai Pte Ltd., the parent company of […]

AI Cybersecurity Phishing

AI’s Role in Scamming: A Look at Emerging Threats

Posted on: April 9, 2025

The rapid development of Artificial Intelligence (AI) has introduced new complexities to online scams, offering sophisticated tools for malicious actors. From creating realistic phishing emails to automating attacks, […]

Cryptocurrency Cybersecurity Malware

New Malware Targets Crypto Users Through Fake Microsoft Office Extensions

Posted on: April 9, 2025

A recent cybersecurity alert warns of a new threat targeting cryptocurrency users via malicious software disguised as legitimate Microsoft Office add-ins. Kaspersky, a prominent security firm, has identified […]

Cryptocurrency Cybersecurity Microsoft

Microsoft Office Add-ins Become Hiding Place for Crypto Malware

Posted on: April 9, 2025

Hackers are using Microsoft Office add-ins to conceal malicious software that swaps cryptocurrency addresses during transactions, posing a significant threat to users and the crypto community. Cybersecurity researchers […]

Posts pagination

Previous page Page 1 … Page 18 Page 19 Page 20 … Page 22 Next page

#BTC AI Altcoin Altcoins Binance Bitcoin Blockchain BlockDAG Cardano Coinbase Crypto Cryptocurrency Crypto Market Crypto Regulation DeFi Dogecoin ETF Ethereum Finance Fintech Investment MAGACOINFINANCE Market Analysis Market Trends Market Volatility Meme Coins Pi Network Presale Price Prediction Qubetics Regulation Ripple SEC Security Shiba Inu Solana Stablecoin Stablecoins SUI Tariffs Technical Analysis Trading Trump Web3 XRP

Copyright © 2025 xpool.eu
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}